First published: Wed Jan 22 2020(Updated: )
Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Galaxy Gear Firmware | <re2 | |
Samsung Galaxy Gear | ||
Samsung Gear 2 Firmware | <re2 | |
Samsung Gear 2 | ||
Samsung Gear Live Firmware | <re2 | |
Samsung Gear Live | ||
Samsung Gear S Firmware | <re2 | |
Samsung Gear S | ||
Samsung Gear S2 Firmware | <re2 | |
Samsung Gear S2 | ||
Samsung Gear S3 Firmware | <re2 | |
Samsung Gear S3 | ||
Samsung Gear Sport Firmware | <re2 | |
Samsung Gear Sport | ||
Samsung Gear Fit Firmware | <re2 | |
Samsung Gear Fit | ||
Samsung Gear Fit 2 Firmware | <re2 | |
Samsung Gear Fit 2 | ||
Samsung Gear Fit 2 Pro Firmware | <re2 | |
Samsung Gear Fit 2 Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-16270.
The severity level of CVE-2018-16270 is high (7.5).
The Samsung Galaxy Gear, Samsung Gear 2, Samsung Gear Live, Samsung Gear S, Samsung Gear S2, Samsung Gear S3, Samsung Gear Sport, Samsung Gear Fit, Samsung Gear Fit 2, and Samsung Gear Fit 2 Pro are affected by CVE-2018-16270.
An unprivileged process can exploit the vulnerability in hcidump utility by dumping Bluetooth HCI packets to an arbitrary file path.
Yes, you can find more information about CVE-2018-16270 in the following references: [1](https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf) and [2](https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be).